We consider the question of approximating Max 2-CSP where each variable
...
In this short note, we show that the problem of computing the recursive
...
Maximum bipartite matching is a fundamental algorithmic problem which ca...
Fairness and privacy are two important concerns in social decision-makin...
We study the complexity of computing (and approximating) VC Dimension an...
We study the complexity of PAC learning halfspaces in the presence of Ma...
Knockout tournaments constitute a popular format for organizing sports
c...
We study several questions related to diversifying search results. We gi...
In multiwinner approval voting, the goal is to select k-member committee...
We give the first polynomial time and sample (ϵ,
δ)-differentially priva...
In this note, we consider the problem of differentially privately (DP)
c...
The shuffle model of differential privacy has attracted attention in the...
Justified representation (JR) is a standard notion of representation in
...
In this work, we study the large-scale pretraining of BERT-Large with
di...
In this note, we prove that the problem of computing the linear discrepa...
This report describes the aggregation and anonymization process applied ...
We study fairness in house allocation, where m houses are to be allocate...
We consider the following variant of contextual linear bandits motivated...
Differential privacy (DP) is a formal notion for quantifying the privacy...
We study the allocation of indivisible goods among groups of agents usin...
Tournaments can be used to model a variety of practical scenarios includ...
We provide an approximation algorithm for k-means clustering in the one-...
In many machine learning applications, the training data can contain hig...
In this work, we study the problem of answering k queries with (ϵ,
δ)-di...
In this paper we prove that the sample complexity of properly learning a...
In this work, we study the trade-off between differential privacy and
ad...
We prove several hardness results for training depth-2 neural networks w...
The k-Median problem is one of the well-known optimization problems that...
We formulate a new hardness assumption, the Strongish Planted Clique
Hyp...
We study the setup where each of n users holds an element from a discret...
We consider a game of persuasion with evidence between a sender and a
re...
We study the task of differentially private clustering. For several basi...
We study the computational complexity of adversarially robust proper lea...
Consensus halving refers to the problem of dividing a resource into two ...
We study closure properties for the Littlestone and threshold dimensions...
Parameterization and approximation are two popular ways of coping with
N...
We study a resource allocation setting where m discrete items are to be
...
The shuffled (aka anonymous) model has recently generated significant
in...
We show, assuming the (randomized) Gap Exponential Time Hypothesis (Gap-...
Consider the setup where n parties are each given a number x_i ∈F_q and ...
The k-Even Set problem is a parameterized variant of the Minimum Distanc...
We study the problem of properly learning large margin halfspaces in
th...
In the Shift-Bribery problem we are given an election, a preferred candi...
We investigate the efficiency of fair allocations of indivisible goods u...
Given a set of n points in R^d, the (monochromatic) Closest Pair
proble...
We consider a fair division setting in which m indivisible items are to ...
We consider the computational complexity of training depth-2 neural netw...
In Maximum k-Vertex Cover (Max k-VC), the input is an edge-weighted grap...
We consider the problem of determining the maximal α∈ (0,1] such
that ev...
In this work, we study the trade-off between the running time of
approxi...